Professional Documents
Culture Documents
Dear Readers,
We are presenting you the Computer Capsule. As per our commitments towards the needs of every student,
this capsule contains all the important facts and details that can be asked in the Upcoming Exams IBPS Exams. We
are starting this with the introduction of the Syllabus. Let us begin now :
1. Fundamentals
2. MS-Office
5. Shortcut Keys
6. Internet
8. DBMS
9. Programming
Languages
10. Miscellaneous
COMPUTER FUNDAMENTALS
A Computer is a general purpose device that can be performing calculations and operations on it and
programmed to carry out a set of arithmetic or generates the desired Output.
logical operations automatically. Since a sequence The device which is used with a computer to display
of operations can be readily changed, the computer or store data is called Peripherals.
can solve more than one kind of problem. The mechanical, magnetic, electronic and electrical
A general purpose computer has four main components that comprises a computer system
components: the arithmetic logic unit (ALU), the such as the Central Processing Unit (CPU), monitor,
control unit, the memory, and the input and output keyboard, etc. is known as Hardware.
devices (collectively termed I/O). A set of instructions that tells the computer about
The data that is fed into a computer processor the tasks to be performed and how these tasks are
received into the computer by a keyboard or other to performed, is known as Software.
sources is called Input. An unprocessed collection or representation of raw
A computer is an electronic device that accepts data facts represented in a manner suitable for
from the user (input), processes the data by communication, interpretation or processing by
humans or by automatic means, is known as Data.
The result of processing, manipulating and Primary memory is computer memory that a
organising data in a way that adds to the knowledge processor or computer accesses first or directly.
of the person receiving it, is known as Information. For example: RAM, and Cache Memory.
The smallest unit of information, a computer can Secondary memory (or secondary storage) is the
understand and process, is known as Bit. slowest and cheapest form of memory. It cannot be
The primary goal of computer is to process processed directly by the CPU.
information that it receives and output the results. Secondary memory devices include magnetic disks
The process of control and alter information is like hard drives and floppy disks, optical disks such
known as Processing. as CDs and CDROMs, and magnetic tapes, which were
The number system computer used to store data and the first forms of secondary memory.
perform calculation - Binary Number System. Virtual memory is memory on the hard disk that
Computer Speed, Accuracy, Diligence, Storage the CPU uses as an extended RAM.
Capability, Automation, Remembrance Power and Installation is the process of copying software
Versatility are the main Characteristics of programs from secondary storage media to the hard
Computer. disk.
Self Intelligence, Decision-Making power, Learning A central computer that holds collections of data and
power, Self care, Feelings are the Limitations of programs for many PCs, workstations and other
Computer. computers is a Server.
A mainframe computer is a much larger computer
that typically fills a room and may cost many
hundreds or thousands of times as much as a
personal computer. They are designed to perform
large numbers of calculations for governments and
large enterprises.
Read-only memory (ROM) is a storage medium
used in computers and other electronic devices. Data
stored in ROM can only be modified slowly or with
difficulty, or not at all.
ROM is non-volatile and the contents are retained
even after the power is switched off.
It only allows reading.
The types of ROM include PROM, EPROM and
EEPROM.
Random Access Memory (RAM),allows the
computer to store data for immediate for immediate
manipulation and to keep track of what is currently
being processed.
RAM is referred to as volatile memory and is lost
when the power is turned off.
It allows reading and writing.
The two main types of RAM are static RAM and
dynamic RAM.
SRAM retains data as long as power is provided to
the memory chip and need not be refreshed
periodically. SRAM stands for Static Random Access
Memory.
MICROSOFT OFFICE
19. A bookmark is an item or location in 25. A feature of MS Word that saves the document
document that you identify as a name for future automatically after certain interval is available
reference. Which of the following task is on
accomplished by using bookmarks? A) Save tab on Options dialog box
A) To add anchors in web page B) Save As dialog box
B) To mark the ending of a paragraph of document C) Both of above D) None of above
C) To quickly jump to specific location in document
D) To add hyperlinks in webpage 26. Where can you find the horizontal split bar on
MS Word screen?
20. A word processor would most likely be used A) On the left of horizontal scroll bar
to do B) On the right of horizontal scroll bar
A) Keep an account of money spent C) On the top of vertical scroll bar
D) On the bottom of vertical scroll bar B) Margin that is added to right margin when
printing
27. Which of the following is not available on the C) Margin that is added to the binding side of page
Ruler of MS Word screen? when printing
A) Tab stop box B) Left Indent D) Margin that is added to the outside of the page
C) Right Indent D) Center Indent when printing
E) All of them are available on ruler
38. Portrait and Landscape are
28. What is place to the left of horizontal scroll A) Page Orientation B) Paper Size
bar? C) Page Layout D) All of above
A) Tab stop buttons B) View buttons
C) Split buttons D) Indicators 39. If you need to change the typeface of a
E) None of above document, which menu will you choose?
A) Edit B) View
29. Which file starts MS Word? C) Format D) Tools
A) Winword.exe B) Word.exe
C) Msword.exe D) Word2003.exe 40. Which of the following is not a font style?
A) Bold B) Italics
30. How many ways you can save a document? C) Regular D) Superscript
A) 3 B) 4 C) 5 D) 6
51. When assigning a shortcut key to a symbol, 56. If you will be displaying or printing your
you should always try to select a key or key document on another computer, youll want to
combination that is: make sure and select the _____________ option under
A) unassigned the Save tab.
B) Located on the ten-key pad section of your A) Embed Fonts B) Embed True Type Fonts
keyboard. C) Save True Type Fonts D) Save Fonts
C) Assigned to another task.
D) From the same font family as the symbol. 57. In Word, the mailing list is known as the
____________.
52. Suppose you wanted to create an AutoCorrect A) Data sheet B) Source
entry that would type the words We regret to C) Data source D) Sheet
inform you that your submission has been
58. Which of the following is not one of the three A) Ctrl + F B) Alt + Ctrl + F
Mail Merge Helper steps? C) Ctrl + D D) Ctrl + Shift + D
A) Merge the two files
B) Create the main document 67. How can you access the font size tool on
C) Set the mailing list parameters formatting toolbar?
D) Create the data source A) Ctrl + S B) Ctrl + Shift + S
C) Ctrl + P D) Ctrl + Shift + P
59. Which of the following button will allow you
to add, delete, or change records in your Data 68. How can you make the selected character
Source? superscripted?
A) Data Source button B) Edit button A) Ctrl + = B) Ctrl + Shift + =
C) Edit Data Source button C) Alt + Ctrl + Shift + = D) None of above
D) Data editing button
69. What does Ctrl + = key effect?
60. It is possible to _______ a data source before A) Superscript B) Subscript
performing a merge. C) All Caps D) Shadow
A) Create B) Modify
C) Sort D) all of the above
Networking Devices
Modem: Modem stands for Modulator-
Demodulator. It is used to connect computers for
communication via telephone lines.
Hub: It works at the Physical layer. It just acts like
a connector of several computers i.e. simply
connects all the devices on its ports together. It
broadcasts all the data packets arriving at it with no
filtering capacity.
Switch: It works at the Data Link Layer. It is used
for dividing a network into segments called subnets.
It provides filtering of data packets and prevents
network traffic also.
Repeater: It operates at thePhysical Layer. It is
used to amplify a signal that has lost its original
strength so as to enable them to travel long
distances. It can only join the networks that
transmit similar data packets. It does not have INFORMATION SECURITY
filtering capacity i.e. all data including noise is
amplified and passed on in the network so dont A Computer Virus is a computer program or code
help in reducing network traffic. that can replicate itself and spread from one
Router: It works at the Network Layer and is used computer system to another system. A computer
to connect different networks that have different virus has the capacity to corrupt or to delete data on
architectures and protocols. It sends the data your computer and it can utilize an e-mail program
packets to desired destination by choosing the best to spread the virus to other computer systems. In
path available thus reducing network traffic. It the worst case scenario, it can even delete
routes the data packets using the routing table that everything on your hard disk. The purpose of it is to
contains all the Information regarding all known disrupt the operation of the computer or the
network addresses, possible paths and cost of program.
transmission over them. Availability of path and Some examples of Computer Virus are Trojan
cost of transmission decide sending of data over viruses. stealth viruses, worms, malware
that path. It is of 2 types: static (manual (malicious software), Disk Killer, Stone virus,
configuration of routing table is needed) and Sunday, Cascade, Nuclear, Word Concept, etc.
dynamic (automatically discovers paths). Malware, short for malicious software, is any
Gateway: It operates in all the layers of the software used to disrupt computer operation,
network architecture. It can be used to connect gather sensitive information, or gain access to
two different networks having different private computer systems. It can appear in the form
architectures, environment and even models. It of executable code, scripts, active content, and other
converts the data packets in form that is suitable to software.
the destination application. The two different Antivirus Software is used to scan the hard disk to
networks may differ in types of communication remove the virus from them. Some of the famous
protocols they use, language, data formats etc. anti viruses available are Avast!, Norton, Avira,
Bridge: They are used two connect two LANs with Kaspersky, AVG, etc.
the same standard but using different types of A person who uses his or her expertise to gain
cables. It provides an intelligent connection by access to other peoples computers to get
allowing only desired messages to cross the information illegally or do damage is a Hacker.
Authorization is the function of specifying access Ring Topology
rights to resources related to information security Mesh Topology
and computer security in general and to access Tree Topology
control in particular. More formally, "to authorize" Hybrid Topology
is to define an access policy.
Authentication is the act of confirming the truth of LOGIC GATES
an attribute of a single piece of data or entity. It
might involve confirming the identity of a person by A logic gate is an elementary building block of a
validating their identity documents, verifying the digital circuit. Most logic gates have two inputs
validity of a website with a digital certificate, and one output. At any given moment, every
tracing the age of an artifact by carbon dating, or terminal is in one of the two binary conditions
ensuring that a product is what its packaging and low (0) or high (1)
labelling claim to be. In other words, Authentication There are seven basic logic gates:
often involves verifying the validity of at least one AND
form of identification. OR
Phishing is the attempt to acquire sensitive XOR
information such as usernames, passwords, and NOT
credit card details (and sometimes, indirectly, NAND
money) by masquerading as a trustworthy entity in
NOR
an electronic communication.
XNOR
A Spoofing attack is a situation in which one
person or program successfully represents oneself
as another by falsifying data and thereby gaining an
illegitimate advantage.
The Open Systems Interconnection model (OSI)
is a conceptual model that characterizes and
standardizes the internal functions of a
communication system by partitioning it into
abstraction layers. The model is a product of the
Open Systems Interconnection project at the
International Organization for Standardization
(ISO).
Seven layers of OSI Model are:
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
Network topology is the arrangement of the
various elements (links, nodes, etc.) of a computer
network.There are two basic categories of network
topologies:
Physical topologies and logical topologies.
Physical topology is the placement of the various
components of a network, including device
location and cable installation, while logical
topology illustrates how data flows within a
network, regardless of its physical design. Various
types of topologies are:
Bus Topology
Star Topology
DATABASE MANAGEMENT SYSTEM external view and it is described by means of a
scheme called external schema.
DBMS is the acronym of Data Base Management Conceptual view/Logical Level- All the database
System. DBMS is a collection of interrelated data entities and the relationship among them are
and a set of programs to access this data in a included. One conceptual view represents the entire
convenient and efficient way. It controls the database called conceptual schema.
organization, storage, retrieval, security and Internal view/Physical Level- It is the lowest level
integrity of data in a database. of abstraction, closest to the physical storage
Architecture of DBMS-The generalized method. It describes how the data is stored, what is
architecture of DBMS is called ANSI/ SPARC model. the structure of data storage and the method of
The architecture is divided into three levels: accessing these data. It is represented by internal
External view or user view/View Level- It is the schema.
highest level of data abstraction. This includes only Data model:A data model is a plan for building a
those portions of database of concern to a user or database. The model represents data conceptually,
Application program. Each user has a different the way the user sees it, rather than how computers
store it. Data models focus on required data PPP Peer to Peer Protocol
elements and associations. IP Internet Protocol
Entity Relationship Model SNMP Simple Network Management Protocol
Relational Model NTP Network Time Protocol
Entity:A thing (animate or inanimate) of SIP Session Initiation Protocol
independent physical or conceptual existence and DHCP Dynamic Host Configuration Protocol
distinguishable. In the University database context, VOIP Voice Are Internet Protocol
an individual student, faculty member, a class room, IMAP4 Internet Message Access Protocol
a course are entities. Version 4
Attributes RARP Reverse Address Resolution Protocol
Each entity is described by a set of SSH Secure Shell
attributes/properties. MIME Multipurpose Internet Mail Extension
Types of Attributes SMIME Secure Mime
Simple Attributes: having atomic or ALGOL Algorithmic Language
indivisible values: Dept a string Phone ANSI American National Standard Institute
Number an eight digit number. ATM Asynchronous Transfer Mode
Composite Attributes: having several AS Autonomous System
components in the value. Example: BASIC Beginners All Purpose Symbolic
Qualification with components (Degree Name, Instruction Code
Year, University Name) BIOS Basic input Output System
Derived Attributes: Attribute value is BPS Bit Per Second
dependent on some other attribute. Example: DNS Domain Name Server
Age depends on Date of Birth. So age is a EDI Electronic Data Interchange
derived attribute. URL Uniform Resource Locator
Single-valued: having only one value rather GIF Graphics Interchange Format
than a set of values. For instance, Place of ASCII American Standard Code for
Birth-single string value. Information Interchange
Multi-valued: having a set of values rather ASP Active Sever Pages
than a single value, for instance, Courses BCC Blind Carbon Copy
Enrolled attribute for student Email Address CAD Computer Aided Design
attribute for student Previous Degree attribute CDMA Code Durian Multiple Access
for student. Attributes can be: simple single- GSM Global System for Mobile
valued, simple multi-valued, composite single- Communication
valued or composite multi-valued. CMOS Complementary Metal Oxide Semi
Conductor
CMYK Cyan Magenta Yellow Block
GPS Global Positioning System
GUI Graphical User Interface
HDMI High Definition Multimedia Interface
FULL FORMS & ABBREVIATIONS GIGO Garbage in Garbage Out
LIFO Last In First Out
TCP Transmission Control Protocol FIFO First In First Out
FTP File Transfer Protocol PING Pocket Internet Gopher
TFTP Trivial File Transfer Protocol HDD Hard Disc Drive
SFTP Secure File Transfer Protocol NIC Network Interface Controller/Cord
SMTP Simple Mail Transfer Protocol HDTV High Definition Television
HTTP Hyper Text Transfer Protocol ISP Internet Service Provider
HTTPS Hyper Text Transfer Protocol Secure JPEG Joint Picture Expert Group
UDP User Datagram Protocol LCD Liquid Crystal Display
ARP Address Resolution Protocol LED Light Emitting Diode
Tel Net Telecommunication Networking TFT Thin Film Transistor
POP3 Post Office Protocol Version3 CRT Cathode Ray Tube
BGP Border Gateway Protocol MIDI Musical Instrument Digital Interface
P2P Point to Point Protocol MPEG Moving Picture Expert Group
PDA Personal Digital Assistants HDD Hard Disc Drive
PDF Portable Document Format FDD Floppy Disc Drive
SQL Structured Query Language CD Compact Disc
USB Universal Serial Bus DVD Digital Video/Versatile Disc
VIRUS Vital Information Resource Under Sieze BRD Blue Ray Disc
VOIP Voice Over Internet Protocol HVD Holographic Versatile Disc
IVR Interactive Voice Response
WIFI Wireless fidelity
WIMAX Worldwide Interoperability for
Microwave Access
ADSL Asymmetric Digital Subscriber Line
API Application Program Interface
ARP Address Resolution Protocol
RARP Reverse ARP
ICANN Internet Corporation of Assign Names
& Numbers
DPI Data Per Inch
DSL Digital Subscriber Line
FAT File Allocation Table
MANET Mobile Ad-Hoc Network
MIPS Million Instruction Per Second
BIPS Billion Instruction Per Second
TIPS Trillion Instruction Per Second
NAT Network Address Translation
IEEE Institute of Electrical and Electronic GLOSSARY
Engineer
A
IMAP Internet Message Access Protocol
Access time - The amount of time it takes for
ISDN Integrated Servers Digital Network
requested information to be delivered from disks
ISO International Standard
and memory.
Organization/International Org for Standardization
Antivirus software - A program designed to look
DHTML Dynamic Hyper Text Markup Language
for and destroy viruses that may infect the memory
MAC Media Access Control
of a computer or les stored on a computer.
CAN Campus Area Network
Articial intelligence (AI) - Computer systems
PAN Personal Area Network
that attempt to imitate human processes for
SAN Storage Area Network
analyzing and solving problems.
CNM Calculatory Network Mode
IPV4 Internet Protocol Version 4 Accumulator - A local storage area called a
IPV6 Internet Protocol Version 6 Register, in which the result of an arithmetic or
DBMS Data Base Management System logic operation is formed.
MODEN Modulator Demodulator
RAM Random Access Memory B
BIT - It is basic unit of computers. It has two values
ROM Read Only Memory
1 & 0 only.
SMPS Switch Mode Power Supply
BYTE - Combination of 8 Bits.
OMR Optical Mark Reader / Recognition
OCR Optical Character Reader / Recognition Basic Input Output System (BIOS) - Also known
BCR Bar Code Reader as ROM BIOS. It provides a abstraction layer for the
MICR Magnetic Ink Character Reader / hardware, i.e., a consistent way for application
Recognition programs and operating system to interact with
PCB Printer Circuit Board input/output devices.
SRAM Static Ram Bug - A software bug is an error, flaw, failure, or
DRAM Dynamic Ram fault in a computer program or system produces an
PROM Programmable Rom incorrect or unexpected result.
EPROM Electrically Prom
EEPROM Electrically Erasable Prom
Bus - A pathway along which electronic signals Flash Memory - It is a type of non-volatile
travel between the components of a computer computer storage chip that can be electrically
system. erased and reprogrammed. It was developed by
EEPROM.
C
Cookie - A packet of information that travels G
between a browser and the web server. Gateway - A machine that links two networks using
Crash - Your computer or application no longer different protocols.
works correctly and so you loose all the work Gigabyte - A measurement of the storage capacity
youve done since the last time you saved. of a device. One gigabyte represents 1024
Command - An instruction that causes a program megabytes.
or computer to perform a function. Google search engine on the web.
Cache - It is a memory storage area that keeps Gopher - A protocol used for locating and
frequent use data readily available to the computer transferring information on the internet. It is an
so that the computer does not retrieve them from internet search tool that allows users to access
slow storage devices. textual information.
Clock Speed - The speed of computer is measured GUI - Graphical User Interface uses icons and
in clock speed. High clock speed is synonymous menus to carry out commands such as opening files,
with high processing capability. It is measured in delete files, move files etc..
Megahertz (MHz). Graphic Interchange Format (GIF) - A simple file
Column - A vertical block of cells in a table or format for pictures and photographs, that are
spreadsheet. compressed so that they can be sent quickly.
D H
Delete - To remove an item of data from a file or to Hard copy - Text or graphics printed on paper; also
remove a file from the disk. called a printout.
Debugging - Locating and eliminating defects in a Hard disk - A rigid type of magnetic medium that
program. can store large amounts of information.
Desktop - The electronic work area on a display Hyperlink - An image or portion of text on a
screen. webpage which is linked to another webpage.
Dots Per Inch (DPI) - It is defined as the measure Hub - A network device that connects multiple
of the resolution of a printer and scanner, or computers on a LAN so that they can communicate
monitor. with another network and the internet.
Domain Name - A unique name that identifies a Header - Repetitive information that appears at the
particular website and represents the name of the top (the head) of every page of a document.
server where the web pages reside. Hypertext transfer protocol (HTTP) - The
protocol used on the World Wide Web that permits
E Web clients (Web browsers) to communicate with
Edit - To make certain changes in existing data. Web servers
Ethernet Card - A network adapter that enables a
computer to connect to an ethernet. I
Icons - In a graphical user interface (GUI), a small,
F pictorial, on screen representation of an object, such
Fax - A shortened form of the word facsimile. A as a document, program, folder or disk drive.
copy of a document transmitted electronically from Instant messaging (IM) - A chat program that lets
one machine to another. people communicate over the Internet in real time.
File transfer protocol (FTP) - A set of guidelines Internet protocol (IP) address - A unique set of
or standards that establish the format in which les numbers that identies a computer over a network.
can be transmitted from one computer to another. Internet service provider (ISP) - An organization
Firewall - A security system usually consisting of that provides access to the Internet for a fee.
hardware and software that prevents unauthorized
persons from accessing certain parts of a program, Intranet - A private network established by an
database, or network. organization for the exclusive use of its employees.
Firewalls prevent outsiders from gaining access the very large volumes of historical or backup data
to an organizations intranet they can store.
J MIPS - An acronym derived from millions of
JPEG - Joint Photographic Experts Group. A format instructions per second. Used to measure the speed
for storing complex graphics in compressed form. of a processor.
Justication - Aligning lines of text at the left Morphing - The transformation of one image into
margin, the right margin, both margins, or the another image.
centre. Text aligned at both margins is considered Mobile Commerce (m-Commerce) - A form of e-
fully justied. commerce that has the ability to conduct monetary
K transactions via a mobile device such as a cell
Keyboard - The device used to enter information phone.
into a computer. Mozilla - a web browser and successor to Netscape
Kilobyte - A measurement of the storage capacity of Communicator.
a device. One kilobyte represents 1024 bytes. Multitasking - The ability of a computer to execute
L more than one program at a time.
LAN - A local area network (LAN) is a computer N
network that interconnects computers within a NIBBLE - Combination of four bits.
limited area such as a home, school, computer Network - A system of interconnected computers.
laboratory, or office building, using network media. They are of three types i. e. LAN, MAN, WAN.
Laptop computer - A portable computer. Also Network Interface Card (NIC) - This is a part of
known as a notebook computer. the computer that allows it to talk to other
Landscape Orientation The positioning of the computers via a network protocol like TCP/IP.
page so that the information is printed across the Node - A computer which is attached to the
long dimension of the page. network. Each node has its own address on the
Liveware - It is a term to describe the human network so that it can be uniquely identified and
system, opposed to hardware or software in a can communicate with other nodes on the same or
computer. different network.
O
Ofine - Refers to the state in which a computer is
temporarily or permanently unable to communicate
with another computer.
Online - Refers to the state in which a computer is
ready to communicate with other computers.
Open source software - Software that makes the
underlying source code available to all users at no
charge.
Operating system (OS) - Software that manages
the internal functions and controls the operations of
a computer.
M P
Macro virus - A type of virus that attaches itself to Palmtop computer - A portable computer smaller
documents or word processing templates. than a notebook (or laptop) computer that ts on
Malware - Software that disrupts normal computer the palm of your hand. Also called a handheld
functions or sends a users personal data without computer.
the users authorization. Password - A users secret identication code,
Memory - The part of a computer that stores required to access stored material. A procedure
information. intended to prevent information from being
Memory Cell - A circuit in memory that represents accessed by unauthorized persons.
a single bit of information. Piracy - The illegal copying of software or other
Mass Storage - Storage systems that provide access creative works.
to hundreds of billions of bytes of stored data. They Peripherals - A connectable device that has an
are often referred to as Archival Storage because of auxiliary function outside the permanent system
configuration such as plotters, printers and graphic Scanner - An input device that can copy a printed
displays. page into a computers memory, thus doing away
Phishing - A type of computer fraud that tries to with the need to type the copy.
trick users into revealing their passwords and other Screen saver - A program that changes the screen
condential information. display while the user is away from the computer.
Pixel - A smallest picture element of a digital image. Server - A computer that manages a shared
The smaller the pixels, the higher the resolution. resource and provides a set of shared user services
Port - An electrical connection on the computer into to the clients.
which a cable can be plugged so that the computer Search Engine - Software that searches, gathers
can communicate with other devices such as printer and identifies information from a database based on
or modem. an index, keywords or titles.
Protocol - A set of rules and regulations that Spam - Unwanted repetitious messages, such as
coordinates the exchange of information over the unsolicited bulk e-mail.
network. Soft copy - Information shown on the display
Portrait orientation - Positioning paper so that screen.
information is printed across the short dimension of Sort - To arrange elds, records, or les in a
the paper. predetermined sequence.
Q Surng the Net - Browsing through various Web
Query - An alternate pipe form of operating system, sites on the Internet in search of interesting things.
which handles data in the form of messages rather T
than bytes. Trash - Place where you put files and folders that
Qwerty - It is one of the standard computer you want to delete or get rid of.
keyboard, with the character Q, W, E, R, T, Y on the Topology - The structure of the network, including
top row of letters on the keyboard. physical connections such as wiring schemes and
R logical interactions between network devices.
Response time - The time a computer takes to Track - A ring on a disk where data can be written.
execute a command. Telnet - A protocol for remote computing on the
Retrieve - To call up information from memory or internet that allows a computer to act as a remote
storage so that it can be processed in some way. terminal on another machine, anywhere on the
Record - A collection of all the information internet.
pertaining to a particular subject. Touchpad - The device on a laptop computer that
Row - A horizontal block of cells in a table or takes the place of a mouse.
spreadsheet. Touch screen technology - The technology that
Resolution - Measurement of the degree of permits a user to perform a function simply by
sharpness of a displayed image. It is defined as touching the screen on an appropriate spot.
number of pixels per square inch on a computer
generated display.
Register - A temporary storage unit for quick,
direct accessibility of a small amount of data for
processing. U
S Uninterrupted Power Supply (UPS) - A Battery
Save As Give the file a name and/or store the file powered backup system that provides enough
in a certain place. electricity to a computer during a power outage so
Save - Tell the computer to create a file on disk that that a user can save files before shutting down the
has the information youve put into the document. computer.
Scroll bar - Allows you to move around through Universal Serial Bus (USB) - A common standard
your document. for connecting multiple peripherals to a computer
as needed.
Shut down - To quit all applications and turn off the
computer. Upload - To transfer information from a client
computer to a host computer.
Spam - unwanted repetitious messages, such as
V
unsolicited bulk e-mail.
Virus - A piece of computer code designed as a
prank or malicious act to spread from one computer
to another by attaching itself to other programs.
W List of some famous E-Commerce Website :
WAP - Wireless Application Protocol is a Paytm (India's Largest mobile commerce platform.
specification for a set of communication protocol Paytm is an Indian e-commerce shopping website
used to allow wireless devices to access the internet launched in 2010)
and other utilities. Amazon
Web browser - Software that permits a user with a Alibaba
click of a mouse to locate, display, and download Flipkart
text, video, audio, and graphics stored in a host Snapdeal
computer on the Web. HomeShop18
The most common Web browsers now in use are Myntra
Internet Explorer, Google Chrome and Mozilla Jabong
Firefox. List of companies recently got the payment bank
Web site - One or more related pages created by an License
individual or an organization and posted on the Tech Mahindra Ltd
World Wide Web.
Vodafone m-pesa Ltd
Wi-Fi (Wireless delity) - A process that permits Reliance Industries Ltd
high-speed wireless transmission of data.
Fino PayTech Ltd
Word processing - The electronic process of
National Securities Depository Ltd
creating, formatting, editing, proofreading, and
Aditya Birla Nuvo Ltd
printing documents.
Airtel M Commerce Services Ltd
Workstation - A desktop computer that runs
applications and serves as an access point in a local
area network.
Z
Zombie - A computer that has been hijacked by a
cracker without the owners knowledge and used to
perform malicious tasks on the Internet.
Miscellaneous
Blackberry 10 OS is the latest version of OS
available for blackberry devices.
Windows 10: Windows 10 launched globally on
29th July. This is the latest version of windows
available for computers. It is yet to be released for
Mobile.
ANDROID 6.0 MARSHMALLOW : Latest version of
the android software released
Google Nexus 6 will be manufactured by Huawei
Microsoft has officially released a beta version of its
Cortana app for Android for anyone to download
and install. Cortana has the ability to replace Google
Now when the users press the Android home button
on a handset. Windows versions of Cortana support
the Hey Cortana voice feature.
iOS 8 is the latest version of the Apple phones
Operating System (Next will be iOS 9)
OS X Yosemite is the latest version of the Apple Mac
Operating System (Next will be OS X El Capitan)